December 3 (Wed.)
09:50
-
10:00
開場致詞
APT
APT Threat Landscape in APAC 2025
APT
Unmasking MetaRAT: A New PlugX Variant in China-Linked APT Operation
APT
Exploring Timeline and Threat Actor Behind Compromised Ivanti Devices
12:15
-
13:25
午餐
Incident Response
Incident Response at the Edge: Unmasking VPN Breaches
APT
Exploiting Trust: When a Trusted Security Solution Becomes a DPRK Trojan Horse
14:50
-
15:15
Tea Break
APT
CamoFei Meets the Taliban
Information Warfare
Collaborative Manipulation: China-Russia Information Warfare Targeting Japan
December 4 (Thur.)
09:50
-
10:00
Opening
Cybercrime
Data Scraping: The Threat Landscape and Best Practices
Cybercrime
The Modern “Pump-and-Dump” Scheme Targeting the Securities Brokerage Industry
Incident Response
ShortFix: When Social Video Platforms Become Infostealer Delivery Channels
12:15
-
13:25
午餐
Cybercrime
Tracking Criminal Activity in I2P: Evidence and Lessons from Real-World Monitoring
Cybercrime
Scaling East: Russian-Speaking Cybercrime Operations, Infrastructure, and AI-Enabled Growth
14:50
-
15:15
中場休息
Cybercrime
Tracking Network Infrastructure Behind Industrial-Scale Scams
Incident Response
Incident Case Studies and Keys to Rapid Response